{"id":86022,"date":"2026-03-16T14:56:15","date_gmt":"2026-03-16T13:56:15","guid":{"rendered":"https:\/\/www.wallix.com\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/"},"modified":"2026-03-16T17:12:38","modified_gmt":"2026-03-16T16:12:38","slug":"seguridad-en-sistemas-de-control-industrial-ics-regulaciones","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/","title":{"rendered":"Seguridad en sistemas de control industrial (ICS): regulaciones"},"content":{"rendered":"<div class='flex_column_table av-4oq7cdt-dff7d5fadd769d135df3264dc8fc1da8 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4oq7cdt-dff7d5fadd769d135df3264dc8fc1da8\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4oq7cdt-dff7d5fadd769d135df3264dc8fc1da8{\nmargin-top:0;\nmargin-bottom:0px;\n}\n.flex_column.av-4oq7cdt-dff7d5fadd769d135df3264dc8fc1da8{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4oq7cdt-dff7d5fadd769d135df3264dc8fc1da8{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4oq7cdt-dff7d5fadd769d135df3264dc8fc1da8 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lpmjpsm0-93e708057f3754c0fb0b5a8e0e379735\">\n#top .av-special-heading.av-lpmjpsm0-93e708057f3754c0fb0b5a8e0e379735{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lpmjpsm0-93e708057f3754c0fb0b5a8e0e379735 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lpmjpsm0-93e708057f3754c0fb0b5a8e0e379735 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lpmjpsm0-93e708057f3754c0fb0b5a8e0e379735 av-special-heading-h1 blockquote modern-quote  avia-builder-el-1  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Seguridad de los Sistemas de Control Industrial (ICS): Normativa<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-2mxemi9-f4ac1d447bb16a09afe606977599c25f av-metadata-container-align-left  avia-builder-el-2  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/es\/author\/yoann-delomier\/\"  rel=\"author\">Yoann Delomier<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >marzo 16, 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/es\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/es\/category\/blogpost\/critical-infrastructure-es\/\" >CRITICAL INFRASTRUCTURE<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/es\/category\/blogpost\/protocolos-industriales\/\" >PROTOCOLOS INDUSTRIALES<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-2tvwxd-c604ad384714c33b4abe3625b9c0e2b2 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-llxk5kq4-ba8d435fd46da0c4db5bdbb61ada6ab8 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span data-contrast=\"auto\">Los <\/span><b><span data-contrast=\"auto\">sistemas de control industrial (ICS)<\/span><\/b><span data-contrast=\"auto\"> son sistemas cr\u00edticos utilizados en sectores como la electricidad, el agua, el petr\u00f3leo, el gas o las infraestructuras de datos. Estos sistemas funcionan a partir de \u00f3rdenes de supervisi\u00f3n centralizadas que se env\u00edan a estaciones y dispositivos remotos. A su vez, estos dispositivos de campo controlan las operaciones, recopilan datos y supervisan el entorno.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Seguridad en los sistemas ICS<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">En los \u00faltimos a\u00f1os, los ciberataques dirigidos a sistemas ICS han aumentado de forma considerable, lo que evidencia la necesidad de reforzar la seguridad en este tipo de entornos industriales. Un ataque contra estos sistemas puede tener consecuencias muy graves para las comunidades y los entornos que dependen de ellos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><b><span data-contrast=\"none\">Las cifras<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Solo en Francia existen m\u00e1s de <\/span><b><span data-contrast=\"auto\">10.000 sistemas ICS registrados<\/span><\/b><span data-contrast=\"auto\">, lo que permite imaginar el enorme n\u00famero de estos sistemas que existen en todo el mundo, muchos de ellos expuestos a un alto riesgo de ciberataque.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En los \u00faltimos cinco a\u00f1os, por ejemplo, <\/span><b><span data-contrast=\"auto\">Estados Unidos ha registrado un aumento del 490 % en los ataques contra sistemas ICS<\/span><\/b><span data-contrast=\"auto\">. Del mismo modo, m\u00e1s de la mitad de las empresas de petr\u00f3leo y gas de la Uni\u00f3n Europea no est\u00e1n suficientemente preparadas para afrontar un gran ataque contra sus sistemas industriales. En el Reino Unido, adem\u00e1s, <\/span><b><span data-contrast=\"auto\">el 91 % de los sistemas SCADA presentan vulnerabilidades importantes frente a posibles brechas de seguridad<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Regulaciones de seguridad en sistemas de control industrial<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Para prevenir ataques de gran impacto, muchos pa\u00edses han empezado a establecer normativas espec\u00edficas de seguridad para sistemas de control industrial. A continuaci\u00f3n se resumen algunos de los organismos reguladores y marcos normativos relevantes en distintos pa\u00edses y sectores.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/blog.wallix.com\/hs-fs\/hubfs\/Infographics\/industrial-control-systems-security.png?width=631&amp;name=industrial-control-systems-security.png\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" srcset=\"https:\/\/blog.wallix.com\/hs-fs\/hubfs\/Infographics\/industrial-control-systems-security.png?width=316&amp;name=industrial-control-systems-security.png 316w, https:\/\/blog.wallix.com\/hs-fs\/hubfs\/Infographics\/industrial-control-systems-security.png?width=631&amp;name=industrial-control-systems-security.png 631w, https:\/\/blog.wallix.com\/hs-fs\/hubfs\/Infographics\/industrial-control-systems-security.png?width=947&amp;name=industrial-control-systems-security.png 947w, https:\/\/blog.wallix.com\/hs-fs\/hubfs\/Infographics\/industrial-control-systems-security.png?width=1262&amp;name=industrial-control-systems-security.png 1262w, https:\/\/blog.wallix.com\/hs-fs\/hubfs\/Infographics\/industrial-control-systems-security.png?width=1578&amp;name=industrial-control-systems-security.png 1578w, https:\/\/blog.wallix.com\/hs-fs\/hubfs\/Infographics\/industrial-control-systems-security.png?width=1893&amp;name=industrial-control-systems-security.png 1893w\" alt=\"industrial-control-systems-security.png\" width=\"631\" height=\"1332\" \/><\/p>\n<p><span data-contrast=\"auto\">En Estados Unidos, los mandatos de <\/span><b><span data-contrast=\"auto\">protecci\u00f3n de infraestructuras cr\u00edticas<\/span><\/b><span data-contrast=\"auto\"> son aplicados por la <\/span><b><span data-contrast=\"auto\">North American Electric Reliability Corporation (NERC)<\/span><\/b><span data-contrast=\"auto\">. Estas regulaciones establecen protocolos de preparaci\u00f3n y respuesta ante incidentes graves que puedan afectar a infraestructuras cr\u00edticas en una regi\u00f3n o en todo el pa\u00eds, especialmente en relaci\u00f3n con la fiabilidad del sistema el\u00e9ctrico estadounidense.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En el \u00e1mbito de la energ\u00eda nuclear, la <\/span><b><span data-contrast=\"auto\">Cyber Security Directorate<\/span><\/b><span data-contrast=\"auto\"> transfiri\u00f3 en 2013 la responsabilidad regulatoria y de supervisi\u00f3n a la <\/span><b><span data-contrast=\"auto\">United States Nuclear Regulatory Commission (USNRC)<\/span><\/b><span data-contrast=\"auto\">. Esta centralizaci\u00f3n del control busca garantizar la fiabilidad de la red el\u00e9ctrica norteamericana.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las regulaciones aplicadas en este sector son especialmente estrictas y est\u00e1n dise\u00f1adas para proteger los ordenadores, sistemas de comunicaci\u00f3n y redes asociados a la energ\u00eda nuclear.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Actualmente, todas las normas derivadas de los programas <\/span><b><span data-contrast=\"auto\">Critical Infrastructure Protection<\/span><\/b><span data-contrast=\"auto\"> y de la <\/span><b><span data-contrast=\"auto\">Cyber Security Directorate<\/span><\/b><span data-contrast=\"auto\"> son obligatorias y contemplan sanciones en caso de incumplimiento.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Los operadores de infraestructuras cr\u00edticas deben establecer protocolos espec\u00edficos para gestionar y responder a ciberataques.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Uni\u00f3n Europea<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">La <\/span><b><span data-contrast=\"auto\">Directiva sobre la Seguridad de las Redes y de los Sistemas de Informaci\u00f3n (Directiva NIS)<\/span><\/b><span data-contrast=\"auto\"> fue adoptada por el Parlamento Europeo en julio de 2016. Su desarrollo cont\u00f3 con la colaboraci\u00f3n de la <\/span><b><span data-contrast=\"auto\">Agencia de la Uni\u00f3n Europea para la Ciberseguridad (ENISA)<\/span><\/b><span data-contrast=\"auto\">, que apoya la implementaci\u00f3n de estas pol\u00edticas y coopera con los equipos operativos de los Estados miembros para garantizar su cumplimiento.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">El objetivo de la directiva es establecer un <\/span><b><span data-contrast=\"auto\">nivel elevado y com\u00fan de seguridad de las redes y de la informaci\u00f3n en toda la Uni\u00f3n Europea<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">La Directiva NIS establece que:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Los Estados miembros deben disponer de equipos adecuados de respuesta ante incidentes y designar una autoridad nacional competente en materia NIS.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Los pa\u00edses deben cooperar e intercambiar informaci\u00f3n relevante sobre seguridad mediante la creaci\u00f3n de una red de equipos de respuesta ante incidentes inform\u00e1ticos (<\/span><i><span data-contrast=\"auto\">Computer Incident Response Teams<\/span><\/i><span data-contrast=\"auto\">).<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Los Estados miembros deben aplicar medidas de seguridad apropiadas para proteger sectores considerados esenciales para la econom\u00eda y la sociedad, como la energ\u00eda, el transporte, el agua, las instituciones financieras, la sanidad o las infraestructuras digitales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">El objetivo de esta normativa es garantizar un nivel elevado y homog\u00e9neo de seguridad de redes e informaci\u00f3n en toda la Uni\u00f3n Europea.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En el momento de su implantaci\u00f3n, los Estados miembros deb\u00edan adaptar sus legislaciones nacionales para incorporar las disposiciones de la directiva e identificar a los operadores de servicios esenciales obligados a cumplirla.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Alemania: seguridad en ICS<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">En Alemania, la seguridad de los sistemas inform\u00e1ticos est\u00e1 regulada por la <\/span><b><span data-contrast=\"auto\">Ley de Seguridad Inform\u00e1tica (IT Security Act)<\/span><\/b><span data-contrast=\"auto\">, aplicada por la <\/span><b><span data-contrast=\"auto\">Oficina Federal de Seguridad de la Informaci\u00f3n (BSI)<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esta ley persigue varios objetivos:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Mejorar la disponibilidad, integridad, confidencialidad y autenticidad de los sistemas inform\u00e1ticos en Alemania.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Reforzar la seguridad inform\u00e1tica dentro de las empresas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Proporcionar mayor protecci\u00f3n a los ciudadanos que utilizan servicios en Internet.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Proteger infraestructuras consideradas cr\u00edticas para el funcionamiento de la sociedad.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">La ley obliga a las empresas a mejorar sus sistemas de seguridad inform\u00e1tica para proteger infraestructuras esenciales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esta normativa afecta a operadores de sitios web, empresas de telecomunicaciones y operadores de infraestructuras cr\u00edticas. El cumplimiento es obligatorio tanto para proveedores de servicios como para terceros. No obstante, se estableci\u00f3 un periodo de transici\u00f3n de dos a\u00f1os para permitir a las organizaciones adaptar sus infraestructuras cr\u00edticas. Las entidades que no cumplan con la normativa pueden enfrentarse a sanciones econ\u00f3micas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Reino Unido<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">En el Reino Unido, el <\/span><b><span data-contrast=\"auto\">Centre for the Protection of National Infrastructure (CPNI)<\/span><\/b><span data-contrast=\"auto\"> ha desarrollado una gu\u00eda de buenas pr\u00e1cticas en ciberseguridad denominada <\/span><b><span data-contrast=\"auto\">Passport to Good Security<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esta gu\u00eda propone un proceso de <\/span><b><span data-contrast=\"auto\">20 pasos<\/span><\/b><span data-contrast=\"auto\"> para ayudar a las organizaciones a evaluar y reforzar su seguridad frente a amenazas cibern\u00e9ticas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Entre las medidas que propone se encuentran:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">identificar amenazas potenciales,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">gestionar riesgos,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">controlar el acceso a los sistemas,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">implantar sistemas de alerta de seguridad,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">y aplicar m\u00faltiples controles de protecci\u00f3n adicionales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Francia<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">La <\/span><b><span data-contrast=\"auto\">Agencia Nacional de Ciberseguridad de Francia (ANSSI)<\/span><\/b><span data-contrast=\"auto\"> trabaja en la implementaci\u00f3n de la Directiva NIS a trav\u00e9s de la <\/span><b><span data-contrast=\"auto\">Ley de Programaci\u00f3n Militar<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esta ley establece qu\u00e9 entidades est\u00e1n sujetas a la normativa y qu\u00e9 tipos de sistemas deben implantarse para garantizar la seguridad.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las infraestructuras cr\u00edticas y los proveedores de servicios de numerosos sectores deben implementar medidas de seguridad en sus sistemas industriales cuando estos tengan impacto en:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">las operaciones militares,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">la econom\u00eda nacional,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">la seguridad del pa\u00eds,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">la capacidad de respuesta ante desastres naturales o conflictos,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">la seguridad de la poblaci\u00f3n francesa.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">La Ley de Programaci\u00f3n Militar incluye m\u00e1s de <\/span><b><span data-contrast=\"auto\">60 requisitos obligatorios<\/span><\/b><span data-contrast=\"auto\"> y su cumplimiento es supervisado por la ANSSI. Las entidades que no respeten estas disposiciones pueden enfrentarse a sanciones.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Cumplir con los est\u00e1ndares de seguridad con WALLIX<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Comprender todas estas normativas de seguridad para sistemas industriales y los cambios que exigen puede resultar complejo. Garantizar el cumplimiento de cada requisito puede suponer un desaf\u00edo para muchas organizaciones.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las soluciones de <\/span><b><span data-contrast=\"auto\">gesti\u00f3n de accesos privilegiados de WALLIX<\/span><\/b><span data-contrast=\"auto\"> facilitan el cumplimiento de estos est\u00e1ndares y ayudan a reducir los riesgos dentro de la organizaci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">La plataforma permite:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">reducir las amenazas externas,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">controlar el acceso de terceros a los sistemas,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">prevenir amenazas internas,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">cumplir con los est\u00e1ndares de conformidad y seguridad inform\u00e1tica.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">B) <\/span><b><span data-contrast=\"auto\">Versi\u00f3n alternativa (m\u00e1s directa y editorial)<\/span><\/b><\/li>\n<\/ol>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Seguridad en sistemas de control industrial (ICS): regulaciones clave<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Los <\/span><b><span data-contrast=\"auto\">sistemas de control industrial (ICS)<\/span><\/b><span data-contrast=\"auto\"> son esenciales para sectores cr\u00edticos como la energ\u00eda, el agua, el petr\u00f3leo, el gas o las infraestructuras digitales. Estos sistemas coordinan operaciones industriales mediante \u00f3rdenes de supervisi\u00f3n centralizadas que se env\u00edan a dispositivos y estaciones remotas encargados de controlar procesos, recoger datos y supervisar el entorno.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En los \u00faltimos a\u00f1os, los ataques dirigidos a estos sistemas han aumentado de forma significativa. Las consecuencias de un ataque pueden ser graves: interrupciones de servicios esenciales, da\u00f1os medioambientales o impactos directos sobre la seguridad de las personas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Un riesgo creciente<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">El n\u00famero de sistemas ICS en funcionamiento es enorme. Solo en Francia existen m\u00e1s de <\/span><b><span data-contrast=\"auto\">10.000 instalaciones registradas<\/span><\/b><span data-contrast=\"auto\">, y el n\u00famero total a nivel mundial es mucho mayor.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las cifras reflejan la magnitud del problema:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">En Estados Unidos, los ataques contra ICS han aumentado <\/span><b><span data-contrast=\"auto\">un 490 % en los \u00faltimos cinco a\u00f1os<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">M\u00e1s de la mitad de las empresas de petr\u00f3leo y gas en la Uni\u00f3n Europea no est\u00e1n preparadas para afrontar un ataque importante contra sus sistemas industriales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">En el Reino Unido, <\/span><b><span data-contrast=\"auto\">el 91 % de los sistemas SCADA presentan vulnerabilidades relevantes<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Regulaciones para proteger infraestructuras cr\u00edticas<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Ante este contexto, numerosos pa\u00edses han desarrollado marcos regulatorios para reforzar la seguridad de los sistemas industriales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Entre los m\u00e1s relevantes destacan:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">En <\/span><b><span data-contrast=\"auto\">Estados Unidos<\/span><\/b><span data-contrast=\"auto\">, las normas de <\/span><b><span data-contrast=\"auto\">Critical Infrastructure Protection (NERC)<\/span><\/b><span data-contrast=\"auto\"> establecen requisitos estrictos para proteger infraestructuras energ\u00e9ticas cr\u00edticas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">En la <\/span><b><span data-contrast=\"auto\">Uni\u00f3n Europea<\/span><\/b><span data-contrast=\"auto\">, la <\/span><b><span data-contrast=\"auto\">Directiva NIS<\/span><\/b><span data-contrast=\"auto\"> busca garantizar un nivel com\u00fan elevado de seguridad de redes e informaci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">En <\/span><b><span data-contrast=\"auto\">Alemania<\/span><\/b><span data-contrast=\"auto\">, la <\/span><b><span data-contrast=\"auto\">Ley de Seguridad Inform\u00e1tica<\/span><\/b><span data-contrast=\"auto\"> obliga a las empresas a reforzar sus sistemas de protecci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">En el <\/span><b><span data-contrast=\"auto\">Reino Unido<\/span><\/b><span data-contrast=\"auto\">, el <\/span><b><span data-contrast=\"auto\">Passport to Good Security<\/span><\/b><span data-contrast=\"auto\"> propone un marco pr\u00e1ctico de evaluaci\u00f3n y mejora de la seguridad.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">En <\/span><b><span data-contrast=\"auto\">Francia<\/span><\/b><span data-contrast=\"auto\">, la <\/span><b><span data-contrast=\"auto\">Ley de Programaci\u00f3n Militar<\/span><\/b><span data-contrast=\"auto\">, supervisada por la ANSSI, define obligaciones espec\u00edficas para infraestructuras cr\u00edticas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Cumplimiento y gesti\u00f3n de accesos<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Aunque cada normativa tiene sus particularidades, todas comparten un elemento com\u00fan: la necesidad de controlar estrictamente el acceso a sistemas cr\u00edticos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las soluciones de <\/span><b><span data-contrast=\"auto\">gesti\u00f3n de accesos privilegiados (PAM)<\/span><\/b><span data-contrast=\"auto\"> ayudan a las organizaciones a cumplir estos requisitos al proporcionar:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">control del acceso de terceros,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">supervisi\u00f3n de sesiones privilegiadas,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">protecci\u00f3n frente a amenazas internas y externas,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">y mecanismos que facilitan el cumplimiento normativo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">De este modo, las organizaciones pueden reforzar la seguridad de sus sistemas industriales y proteger infraestructuras cr\u00edticas frente a amenazas cada vez m\u00e1s sofisticadas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-m418tvvx-5f8404617ef6e80226a8150d224dcfd3-wrap avia-button-center  avia-builder-el-5  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m418tvvx-5f8404617ef6e80226a8150d224dcfd3\">\n#top #wrap_all .avia-button.av-m418tvvx-5f8404617ef6e80226a8150d224dcfd3{\nbackground-color:#ec6707;\nborder-color:#ea6e52;\ncolor:#ffffff;\nborder-style:solid;\nborder-width:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-m418tvvx-5f8404617ef6e80226a8150d224dcfd3:hover{\nbackground-color:#ffffff;\ncolor:#f17c00;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-m418tvvx-5f8404617ef6e80226a8150d224dcfd3 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-m418tvvx-5f8404617ef6e80226a8150d224dcfd3:hover .avia-svg-icon svg:first-child{\nfill:#f17c00;\nstroke:#f17c00;\n}\n<\/style>\n<a href='https:\/\/www.wallix.com\/es\/empresa\/contactanos\/'  class='avia-button av-m418tvvx-5f8404617ef6e80226a8150d224dcfd3 av-link-btn avia-icon_select-no avia-size-large avia-position-center'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Preg\u00fantanos\"><span class='avia_iconbox_title' >Preg\u00fantanos<\/span><\/a><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4bf1oq9-ab85db3426ba8f7a14e92d56538da1f0\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4bf1oq9-ab85db3426ba8f7a14e92d56538da1f0{\nmargin-top:0;\nmargin-bottom:0px;\n}\n.flex_column.av-4bf1oq9-ab85db3426ba8f7a14e92d56538da1f0{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4bf1oq9-ab85db3426ba8f7a14e92d56538da1f0{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4bf1oq9-ab85db3426ba8f7a14e92d56538da1f0 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3yr3xo1-c3b298b1e12d3dc591ae54409a1a91e4 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Compartir esta entrada<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en X\" href='https:\/\/twitter.com\/share?text=Seguridad%20en%20sistemas%20de%20control%20industrial%20%28ICS%29%3A%20regulaciones&#038;url=https:\/\/www.wallix.com\/es\/?p=86022' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en X'><span class='avia_hidden_link_text'>Compartir en X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Seguridad%20en%20sistemas%20de%20control%20industrial%20%28ICS%29%3A%20regulaciones&#038;url=https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en LinkedIn'><span class='avia_hidden_link_text'>Compartir en LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Compartir por correo\" href='mailto:?subject=Seguridad%20en%20sistemas%20de%20control%20industrial%20%28ICS%29%3A%20regulaciones&#038;body=https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir por correo'><span class='avia_hidden_link_text'>Compartir por correo<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3h6gq9d-953f1bea9bfe09dad6e954fcf4639321\">\n#top .hr.hr-invisible.av-3h6gq9d-953f1bea9bfe09dad6e954fcf4639321{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3h6gq9d-953f1bea9bfe09dad6e954fcf4639321 hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-33i38z5-c12ebd9f93690467d5f31e466a996913\">\n#top .av-special-heading.av-33i38z5-c12ebd9f93690467d5f31e466a996913{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-33i38z5-c12ebd9f93690467d5f31e466a996913 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-33i38z5-c12ebd9f93690467d5f31e466a996913 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-33i38z5-c12ebd9f93690467d5f31e466a996913 av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenidos relacionados<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2mz0hu9-04051994f5daea639806f82ae7841571\">\n#top .hr.hr-invisible.av-2mz0hu9-04051994f5daea639806f82ae7841571{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2mz0hu9-04051994f5daea639806f82ae7841571 hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-2a6ukdt-876cf20d1c0d68aacac9eb347b22465c  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-86057 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteger Industry 4.0: c\u00f3mo defender infraestructuras cr\u00edticas en la era de la convergencia IT\/OT\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-16T16:01:03+01:00\" >marzo 16, 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/proteger-industry-4-0-como-defender-infraestructuras-criticas-en-la-era-de-la-convergencia-it-ot\/' title='Enlace a: Proteger Industry 4.0: c\u00f3mo defender infraestructuras cr\u00edticas en la era de la convergencia IT\/OT'>Proteger Industry 4.0: c\u00f3mo defender infraestructuras cr\u00edticas en la era de la convergencia IT\/OT<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-86022 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Seguridad en sistemas de control industrial (ICS): regulaciones\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-16T14:56:15+01:00\" >marzo 16, 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/' title='Enlace a: Seguridad en sistemas de control industrial (ICS): regulaciones'>Seguridad en sistemas de control industrial (ICS): regulaciones<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68362 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Industria 4.0 en jaque: Un futuro conectado, pero inseguro\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:31:38+01:00\" >febrero 12, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/industria-4-0-la-importancia-de-asegurar-un-futuro-conectado-2\/' title='Enlace a: Industria 4.0 en jaque: Un futuro conectado, pero inseguro'>Industria 4.0 en jaque: Un futuro conectado, pero inseguro<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1mg0e0h-3c3cd32ced575b006b9460912d0d270c\">\n#top .av-special-heading.av-1mg0e0h-3c3cd32ced575b006b9460912d0d270c{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1mg0e0h-3c3cd32ced575b006b9460912d0d270c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1mg0e0h-3c3cd32ced575b006b9460912d0d270c .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1mg0e0h-3c3cd32ced575b006b9460912d0d270c av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Recursos relacionados<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-109uofl-63cd75093fb669b1b9defa314e7e187f\">\n#top .hr.hr-invisible.av-109uofl-63cd75093fb669b1b9defa314e7e187f{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-109uofl-63cd75093fb669b1b9defa314e7e187f hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-kgskfl-c08c8e94402ecda749c328febca1acdb  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-67436 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Tres estrategias para que mejores la seguridad de los accesos remotos en tu entorno industrial\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-30T11:55:34+01:00\" >diciembre 30, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/tres-estrategias-mejores-la-seguridad-los-accesos-remotos-entorno-industrial\/' title='Enlace a: Tres estrategias para que mejores la seguridad de los accesos remotos en tu entorno industrial'>Tres estrategias para que mejores la seguridad de los accesos remotos en tu entorno industrial<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":83092,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1643,1674,1761],"tags":[],"class_list":["post-86022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-critical-infrastructure-es","category-protocolos-industriales"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seguridad en sistemas de control industrial (ICS): regulaciones - WALLIX<\/title>\n<meta name=\"description\" content=\"El \u00edndice de ciberataques es cada vez mayor y los ciberdelincuentes son cada vez m\u00e1s listos. \u00a1Descubre c\u00f3mo detener estas cifras hoy mismo!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguridad en sistemas de control industrial (ICS): regulaciones - WALLIX\" \/>\n<meta property=\"og:description\" content=\"El \u00edndice de ciberataques es cada vez mayor y los ciberdelincuentes son cada vez m\u00e1s listos. \u00a1Descubre c\u00f3mo detener estas cifras hoy mismo!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-16T13:56:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-16T16:12:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yoann Delomier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yoann Delomier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/\"},\"author\":{\"name\":\"Yoann Delomier\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/person\/00f947e8a49ff986a84cbafaea5f531f\"},\"headline\":\"Seguridad en sistemas de control industrial (ICS): regulaciones\",\"datePublished\":\"2026-03-16T13:56:15+00:00\",\"dateModified\":\"2026-03-16T16:12:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/\"},\"wordCount\":3542,\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"CRITICAL INFRASTRUCTURE\",\"PROTOCOLOS INDUSTRIALES\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/\",\"url\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/\",\"name\":\"Seguridad en sistemas de control industrial (ICS): regulaciones - WALLIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg\",\"datePublished\":\"2026-03-16T13:56:15+00:00\",\"dateModified\":\"2026-03-16T16:12:38+00:00\",\"description\":\"El \u00edndice de ciberataques es cada vez mayor y los ciberdelincuentes son cada vez m\u00e1s listos. \u00a1Descubre c\u00f3mo detener estas cifras hoy mismo!\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg\",\"width\":2560,\"height\":1435},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wallix.com\/es\/#website\",\"url\":\"https:\/\/www.wallix.com\/es\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wallix.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wallix.com\/es\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\/\/www.wallix.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/wallixcom\",\"https:\/\/www.linkedin.com\/company\/wallix\/\",\"https:\/\/www.youtube.com\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/person\/00f947e8a49ff986a84cbafaea5f531f\",\"name\":\"Yoann Delomier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g\",\"caption\":\"Yoann Delomier\"},\"description\":\"Yoann Delomier is a seasoned expert in OT cybersecurity and industrial systems protection. As Business Strategy Leader for Operational Technology at WALLIX, he focuses on securing critical infrastructures such as manufacturing, energy, and transport systems. His expertise spans ICS\/SCADA environments, compliance with industry-specific regulations, and Zero Trust adoption in OT.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/yoann-delomier\/\"],\"url\":\"https:\/\/www.wallix.com\/es\/author\/yoann-delomier\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad en sistemas de control industrial (ICS): regulaciones - WALLIX","description":"El \u00edndice de ciberataques es cada vez mayor y los ciberdelincuentes son cada vez m\u00e1s listos. \u00a1Descubre c\u00f3mo detener estas cifras hoy mismo!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/","og_locale":"es_ES","og_type":"article","og_title":"Seguridad en sistemas de control industrial (ICS): regulaciones - WALLIX","og_description":"El \u00edndice de ciberataques es cada vez mayor y los ciberdelincuentes son cada vez m\u00e1s listos. \u00a1Descubre c\u00f3mo detener estas cifras hoy mismo!","og_url":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/","og_site_name":"WALLIX","article_published_time":"2026-03-16T13:56:15+00:00","article_modified_time":"2026-03-16T16:12:38+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg","type":"image\/jpeg"}],"author":"Yoann Delomier","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Escrito por":"Yoann Delomier","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/"},"author":{"name":"Yoann Delomier","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/00f947e8a49ff986a84cbafaea5f531f"},"headline":"Seguridad en sistemas de control industrial (ICS): regulaciones","datePublished":"2026-03-16T13:56:15+00:00","dateModified":"2026-03-16T16:12:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/"},"wordCount":3542,"publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg","articleSection":["BLOGPOST","CRITICAL INFRASTRUCTURE","PROTOCOLOS INDUSTRIALES"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/","url":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/","name":"Seguridad en sistemas de control industrial (ICS): regulaciones - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg","datePublished":"2026-03-16T13:56:15+00:00","dateModified":"2026-03-16T16:12:38+00:00","description":"El \u00edndice de ciberataques es cada vez mayor y los ciberdelincuentes son cada vez m\u00e1s listos. \u00a1Descubre c\u00f3mo detener estas cifras hoy mismo!","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/blogpost\/seguridad-en-sistemas-de-control-industrial-ics-regulaciones\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/12\/wallix_one_console-scaled.jpeg","width":2560,"height":1435},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/es\/#website","url":"https:\/\/www.wallix.com\/es\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/es\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/00f947e8a49ff986a84cbafaea5f531f","name":"Yoann Delomier","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g","caption":"Yoann Delomier"},"description":"Yoann Delomier is a seasoned expert in OT cybersecurity and industrial systems protection. As Business Strategy Leader for Operational Technology at WALLIX, he focuses on securing critical infrastructures such as manufacturing, energy, and transport systems. His expertise spans ICS\/SCADA environments, compliance with industry-specific regulations, and Zero Trust adoption in OT.","sameAs":["https:\/\/www.linkedin.com\/in\/yoann-delomier\/"],"url":"https:\/\/www.wallix.com\/es\/author\/yoann-delomier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/86022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/comments?post=86022"}],"version-history":[{"count":7,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/86022\/revisions"}],"predecessor-version":[{"id":86079,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/86022\/revisions\/86079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media\/83092"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media?parent=86022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/categories?post=86022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/tags?post=86022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}